• Title/Summary/Keyword: misuse

Search Result 414, Processing Time 0.024 seconds

A Method of Evaluating Korean Articulation Quality for Rehabilitation of Articulation Disorder in Children

  • Lee, Keonsoo;Nam, Yunyoung
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.8
    • /
    • pp.3257-3269
    • /
    • 2020
  • Articulation disorders are characterized by an inability to achieve clear pronunciation due to misuse of the articulators. In this paper, a method of detecting such disorders by comparing to the standard pronunciations is proposed. This method defines the standard pronunciations from the speeches of normal children by clustering them with three features which are the Linear Predictive Cepstral Coefficient (LPCC), the Mel-Frequency Cepstral Coefficient (MFCC), and the Relative Spectral Analysis Perceptual Linear Prediction (RASTA-PLP). By calculating the distance between the centroid of the standard pronunciation and the inputted pronunciation, disordered speech whose features locates outside the cluster is detected. 89 children (58 of normal children and 31 of children with disorders) were recruited. 35 U-TAP test words were selected and each word's standard pronunciation is made from normal children and compared to each pronunciation of children with disorders. In the experiments, the pronunciations with disorders were successfully distinguished from the standard pronunciations.

A Volunteer Alcohol Consumption Reduction Campaign: Participatory Action Research among Thai Women in the Isaan Region

  • Jongudomkarn, Darunee
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.15 no.17
    • /
    • pp.7343-7350
    • /
    • 2014
  • Cancer is one of the leading causes of death in Thailand as well as other countries. Evidences from studies in Asia show that alcohol consumption has been linked to an increased risk for various types of cancer. In the qualitative participatory action research presented here, the possibilities of a volunteer women's movement to reduce harmful alcohol consumption by facilitating the creation of emancipatory knowledge in the Thai-Isaan community was explored. During in-depth interviews with 10 female volunteer participants, the following themes emerged: merit making, developing a sense of personal empowerment, and the experience of participating in an action plan that utilized various strategies. The project activities empowered participants to create and share knowledge which was then applied toward action for change. Adoption of this type of program by local health care providers to reduce health problems and risks related to alcohol misuse in similar contexts and cultures is recommended.

A Study on Concentration Change of Volatile Organic Compounds; VOCs by using Mock-up Test (실물실험을 통한 개별 VOC의 농도변화에 관한 연구)

  • Kim Chang-Nam;Lee Yun-Gyu
    • Korean Journal of Air-Conditioning and Refrigeration Engineering
    • /
    • v.17 no.5
    • /
    • pp.487-495
    • /
    • 2005
  • Recently, due to the airtightness of buildings or the misuse of building materials, we have been witness SHS (Sick House Syndrome) which can have bad influences on the resident in an existing apartment house as well as newly constructed apartment house start to attract public attention. As a result of this situation, we went to restrict the TVOC (Total Volatile Organic Compound) and formaldehyde. But these guidelines concentrated on only TVOC although TVOC are consist of many individual VOC. Therefore, in this study, we will look about concentration change of VOCs (Volatile Organic Compounds) by using Mock-up test. As result of test, the concentration of four individual VOC (Benzene, Toluene, Ethylbenzene, Styrene) showed quitely low level after 7 days. On the other hand the concentration of Xylene and formaldehyde showed low level after 14 days.

A Study on Computer Security and Controls (Computer Security에 관한 소고 - 사고범죄예방을 중심으로 -)

  • 이종철
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.4 no.4
    • /
    • pp.25-34
    • /
    • 1981
  • Recently there has been a marked increase in concern for security in computerized operations. The purposes of computer security controls are to protect against the unauthorized access to and modification of data processing resources, unauthorised access to and modification of data files and software, and the misuse of authorized activities. The controls relate to the physical security of the data processing department and of the areas within the data processing department : to the security of the data files, programs, and system software : and to the human interaction with the data files, programs, and system software. The controls that will be discussed in this paper include : I. Risk on the computer use. II. Methods of risk counter measure. III. Role of system auditing.

  • PDF

Optimizing of Intrusion Detection Algorithm Performance and The development of Evaluation Methodology (침입탐지 알고리즘 성능 최적화 및 평가 방법론 개발)

  • Shin, Dae Cheol;Kim, Hong Yoon
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.8 no.1
    • /
    • pp.125-137
    • /
    • 2012
  • As the Internet use explodes recently, the malicious attacks and hacking for a system connected to network occur frequently. For such reason, lots of intrusion detection system has been developed. Intrusion detection system has abilities to detect abnormal behavior and unknown intrusions also it can detect intrusions by using patterns studied from various penetration methods. Various algorithms are studying now such as the statistical method for detecting abnormal behavior, extracting abnormal behavior, and developing patterns that can be expected. Etc. This study using clustering of data mining and association rule analyzes detecting areas based on two models and helps design detection system which detecting abnormal behavior, unknown attack, misuse attack in a large network.

A soldering station controller for two types heater (이종의 인두기 히터를 제어하는 솔더링 스테이션)

  • Oh, Kab-suk
    • Journal of Power System Engineering
    • /
    • v.19 no.3
    • /
    • pp.48-54
    • /
    • 2015
  • This paper introduced a design method of soldering station that can control two types of soldering iron heater. At design time, to distinguish two types of soldering iron heater the voltage divider rule has been applied, and the distinguished resistor is inserted to handler of soldering iron to prevent misuse by users. And an algorithm to design a PID controllers is proposed. The proposed controllers parameter which can be easily realized, and are designed by using the input output data from systems, and have outstanding ability making the output response of nonlinear systems similar to the desired one. Temperature control experiments were performed to verify the ability of the suggested controller. As a result, suggested PID controller followed the desired ones, and one soldering station can control the various type of soldering irons in real time.

A Diagnosis Study on the Korea Transport Database for Stable Feasibility Analysis on Transportation Facilities (국가교통시설 안정적 타당성 평가를 위한 국가교통데이터베이스 관리체제 진단 연구)

  • Kim, Jin-Tae
    • International Journal of Highway Engineering
    • /
    • v.16 no.4
    • /
    • pp.97-110
    • /
    • 2014
  • PURPOSES: This study is to find the substantial shortcomings embedded in the government policies and practical administrative processes associated with the Korean Transportation Database (KTDB) and to propose preliminary approaches to overcome. METHODS: Administrative and socioeconomic issues on inefficiency in public and private investment and redemption was found from the literature review. Through the interview of sets of experts and practitioners, a set of faultiness embodied in the administrative procedure utilizing and managing KTDB was found and analyzed. RESULTS: This study found the erroneous administrative elements categorized into four groups: faulty socioeconomic data supporting local governors's optimistic will yielded overestimation of future traffic demand; faulty data incidentally introduced in KTDB burdened traffic demand analysis; unavoidable misuse of KTDB worsened the unstability of KTDB; and apathy to manage the KTDB data deviated systematic management. The proposed includes the alteration of the administrative and technical systems to overcome those shortcomings. CONCLUSIONS : Erroneous administrative elements associated with KTDB should be concerned prior to indicating subsequential faultiness in demand analysis.

A Survey on Needs and Current Conditions of School Health Education Contents in the Elementary School (보건교육 실태 및 내용 요구도 조사)

  • Lee, Gyu-Yeong
    • Journal of the Korean Society of School Health
    • /
    • v.19 no.2
    • /
    • pp.1-12
    • /
    • 2006
  • Purpose: The purpose of this study was to investigate the current conditions and to analysis the needs of health education contents in school nurses and elementary school children. Methods : The survey was conducted through the questionnaire with school nurses and students. Subjects were 60 school nurse and 1483 elementary school children. Data was collected based on the from Mar to Apr. 2004. Finally, data was analyzed using mean, SD, and t-test. Results : The students need the health education related safety, oral hygiene, visual promotion, scoliosis prevention, cyber addiction prevention, anti-bullying and school violence prevention. School nurses suggest the contents of health education such as sex education, drug misuse and overuse prevention. There was also a difference in the need of health education among the school nurse and students. Conclusion:I suggest that health education should be conducted taking students' demand in each grade into consideration. School nurses need to positively improve the priorities of health education based on the students' demand.

Intrusion Detection through Monitoring of Network Security Status (네트워크 보안상태 감시를 통한 침입탐지)

  • 황혜선;이상호;임채호
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2001.11a
    • /
    • pp.153-156
    • /
    • 2001
  • Code Red, Nimda 등 최근 인터넷웜(Internet Worm)에 의한 침입은 방화벽시스템, 침입탐지시스템 등 보안제품이 존재하는 네트워크에서도 적절한 대책이 되지 않은 경향을 보이고 있다. 침입차단시스템을 통과할 수 있는 신종 취약점을 이용한 침입에는 오용방지방법(Misuse Detection)에 의한 침입탐지시스템이 침입패턴을 업데이트하기 전에 이미 네트 워크에 피해를 입힐 가능성이 크게 증가하는 것이다. 향후에도 크게 증가할 것으로 보이는 인터넷웜 공격 등에는 침입차단시스템, 침입탐지시스템 등 보안제품의 로그기록 상황과 네트워크의 보안상태를 지속적으로 감시함으로서 조기에 침입을 탐지할 수 있다. 본 논문에서는 신종 웜 공격에 의한 침입이 발생되었을 때 IDS가 탐지하지 못하는 상황에서도 침입의 흔적을 조기에 발견할 수 있는 네트워크 보안 상태변수확인방법(Network Security Parameter Matching Method)을 제안하고자 한다.

  • PDF

Comparison of the Bass Model and the Logistic Model from the Point of the Diffusion Theory (확산이론 관점에서 로지스틱 모형과 Bass 모형의 비교)

  • Hong, Jung-Sik;Koo, Hoon-Young
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.37 no.2
    • /
    • pp.113-125
    • /
    • 2012
  • The logistic model and the Bass model have diverse names and formulae in diffusion theory. This diversity makes users or readers confused while it also contributes to the flexibility of modeling. The method of handling the integration constant, which is generated in process of deriving the closed form solution of the differential equation for a diffusion model, results in two different 'actual' models. We rename the actual four models and propose the usage of the models with respect to the purpose of model applications. The application purpose would be the explanation of historical diffusion pattern or the forecasting of future demand. Empirical validation with 86 historical diffusion data shows that misuse of the models can draw improper conclusions for the explanation of historical diffusion pattern.